Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Vidar Malware Launcher Concealed in Help File | Trustwave

March 15, 2022October 14, 2025 Securonix

Phishing email delivers an ISO attached as request.doc that unpacks a CHM loader and Vidar payload. Vidar collects system and browser data, downloads dependencies from Mastodon-based C2, and can fetch additional malware from the same infrastructure. #Vidar #CH…

Read More
Threat Research

A Whirlwind Tour Of Crypto Phishing

March 15, 2022October 16, 2025 Securonix

The article surveys how crypto phishing relies on malvertising, social media campaigns, and fake wallet prompts to steal seed phrases, wallets, and NFTs—from Ledger impersonations to Vitalik Buterin fakery and ApeCoin scams. It also highlights techniques like …

Read More
Threat Research

Internet Storm Center Diary 2022-03-23

March 15, 2022October 16, 2025 Securonix

Vidar emerged in 2018 as a copycat of Arkei and has spawned Oski Stealer and Mars Stealer variants. The diary traces how these families rely on legitimate DLLs hosted on their C2 servers and exfiltrate data as zip archives via HTTP POST. #Vidar #OskiStealer #M…

Read More
Threat Research

Conti Affiliate Exposed: New Domain Names, IP Addresses and Email…

March 15, 2022October 15, 2025 Securonix

TRU and BreakPoint Labs uncovered a Conti affiliate operating an automated Cobalt Strike infrastructure, exposing new domain names, IP addresses, and emails used for command-and-control. The findings link Conti operations to Trickbot, BazarLoader, IcedID, Five…

Read More
Threat Research

Mēris and TrickBot standing on the shoulders of giants – Avast Threat Labs

March 14, 2022October 18, 2025 Securonix

Avast Threat Labs connects Meris, TrickBot, and Glupteba campaigns to a single C2 that covertly controls roughly 230,000 MikroTik routers in a botnet-as-a-service. The research traces exploitation of CVE-2018-14847, wides…

Read More
Threat Research

Password stealer disguised as private Fortnite server spreading via Discord

March 14, 2022October 14, 2025 Securonix

Avast researchers uncovered a password stealer disguised as a private Fortnite server, distributed primarily via Discord with TikTok tutorials guiding victims to download it. The campaign targets Russian gamers, stealing credentials and other information saved…

Read More
Threat Research

Cyble – Hunters Become The Hunted

March 14, 2022October 19, 2025 Securonix

AvD crypto stealer is a disguise for a Clipper variant that reads and edits clipboard content to swap crypto wallet addresses. The actor offers one month of free access to attract more users, with targets including other threat actors and six supported chains.…

Read More
Threat Research

Distribution of ClipBanker Disguised as Malware Creation Tool – ASEC BLOG

March 14, 2022October 20, 2025 Securonix

AhnLab ASEC reports ClipBanker being distributed as a malware-creation tool on a site called “Russia black hat,” with attackers bundling both malware and the tool (Quasar RAT builder). The dropper uses crack.exe to launch ClipBanker, which then runs in the bac…

Read More
Threat Research

Mustang Panda’s Hodur: Old tricks, new Korplug variant

March 14, 2022October 14, 2025 Securonix

Researchers at ESET uncovered an ongoing Mustang Panda operation using a new Korplug variant, Hodur, noted for its aggressive anti-analysis and memory-only loading chain. The campaign uses European-current-events decoys to target diplomatic missions, research …

Read More
Threat Research

BitRAT Disguised as Windows Product Key Verification Tool Being Distributed – ASEC BLOG

March 11, 2022October 15, 2025 Securonix

Security researchers at ASEC uncovered BitRAT distributed via Korean webhards, masquerading as a Windows license verification tool. The attack chain uses a multi-stage dropper that hides a downloader, which then fetches BitRAT and broader capabilities, includi…

Read More
Threat Research

PHOSPHORUS Automates Initial Access Using ProxyShell

March 11, 2022October 20, 2025 Securonix

APT35 (PHOSPHORUS/UNC2448) leveraged Microsoft Exchange ProxyShell vulnerabilities to gain initial access, deploy web shells, and perform post-exploitation tasks, including credential dumping and payload deployment. The activity appears scripted and automated,…

Read More
Threat Research

APT Attack Being Distributed as Windows Help File (*.chm) – ASEC BLOG

March 11, 2022October 19, 2025 Securonix

ASEC uncovered malware distributed as Windows Help Files (.chm) aimed at Korean users, delivered via compressed email attachments. When opened, the CHM dropper spawns VBScript and PowerShell payloads, persists through a Run key, and downloads a second-stage do…

Read More
Threat Research

Suspected DarkHotel APT Activity Update

March 11, 2022October 16, 2025 Securonix

Threat researchers describe a first-stage spearphishing campaign targeting luxury hotels in Macao that used a password-protected Excel file with macros to drop and execute further payloads via scheduled tasks and PowerShell. The operation, attributed to DarkHo…

Read More
Threat Research

New Ransomware Family Identified: LokiLocker RaaS Targets Windows Systems

March 10, 2022October 17, 2025 Securonix

BlackBerry Threat Intelligence identifies LokiLocker as a new RaaS ransomware family that encrypts Windows files using AES-256 and RSA-2048, with virtualization protection via KoiVM/NETGuard to hinder analysis. The campaign also features a possible false-flag …

Read More
Threat Research

Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain | Proofpoint US

March 10, 2022October 18, 2025 Securonix

Proofpoint details a targeted French campaign delivering a backdoor named Serpent through a macro-enabled Word document that installs Chocolatey and Python via steganography. The operation uses Tor-based C2, a novel schtasks-based execution technique, and onio…

Read More

Posts pagination

Previous 1 … 480 481 482 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.